Sciweavers

140 search results - page 6 / 28
» Model-based design of reverse engineering tools
Sort
View
IEEEIAS
2007
IEEE
14 years 2 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
WCRE
1993
IEEE
14 years 21 hour ago
A Practical Program Transformation System for Reverse Engineering
Program transformation systems provide one means of formally deriving a program from its speci cation. The main advantage of this development method is that the executable program...
M. Ward, K. Bennett
WCRE
1999
IEEE
14 years 5 days ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
ACSC
2004
IEEE
13 years 11 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
WCRE
2005
IEEE
14 years 1 months ago
Design Pattern Detection in Eiffel Systems
The use of design patterns in a software system can provide strong indications about the rationale behind the system’s design. As a result, automating the detection of design pa...
Wei Wang, Vassilios Tzerpos